Organizations will task security administrators, human resources, the legal department, and other departments to develop appropriate security policies to enhance the control, monitoring, and protection of intellectual property. Some of this protection comes from liability from a legal perspective, privilege access from a human resource protection perspective, or simply data management from a security perspective.
This assignment will guide you through developing a comprehensive security policy that sets guidelines for protecting information systems from malicious activity.
Review Module 3 in the textbook and research various templates online to identify how organizations generate clear and concise policies to create the standards, guidelines, and procedures throughout the enterprise infrastructure.
Using the same fictitious organization selected in Topic 1, develop a 3-5-minute video presentation on an information security policy and address the following:
- Include an introduction of the company and display of the logo (you may copy/paste it from the corporate profile).
- Create a list of what will be covered in the video.
- Describe the purpose, scope, or objective statement that aligns with the corporate profile.
- Discuss issues of network management and propose possible solutions.
- Describe how professionals will apply security principles and practices to the environment, hardware, software, and human aspects of the system.
- Explain the importance of cryptographic protocols, tools, and techniques within the company infrastructure.
- Evaluate security mechanisms based on cryptography.
- Describe logical access controls to data processing systems, e.g., passwords, smartcards, tokens, biometrics, cryptography.
Show professionalism in your speech and appearance.
Use an online video platform such as Loom, YouTube, or Vimeo to upload your completed video. Add the link to your video to a Microsoft Word document and ensure that others can access and view your linked video prior to submitting it to the digital classroom.
This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
You are not required to submit this assignment to LopesWrite.
Benchmark Information
This benchmark assignment assesses the following programmatic competencies:
BS Cybersecurity
2.4: Discuss issues of network management and propose possible solutions.
3.3: Apply security principles and practices to the environment, hardware, software, and human aspects of a system.
4.4: Evaluate security mechanisms based on cryptography.
6.3: Explain which cryptographic protocols, tools, and techniques are appropriate for a given situation (M7, M8, M9, O3, O5, O13, O15)
6.5: Examine logical access controls to data processing systems, e.g., passwords, smartcards, tokens, biometrics, cryptography.